Raghav Mittal
Vol. 5, Jan-Dec 2019
Page Number: 37 - 42
Abstract:
From the last few years, the scope of cloud computing is increased more. With the improvement in the field of distributed computing, there is additionally the need to verify the information by utilizing concentrated assets. The significant test in distributed computing is to give security, respectability, and dependability to the client's information. Cloud computing is an effective field for IT specialists due to its potential for transformation in the computer industry. Unfortunately, there are also some issues to be resolved and the security aspects in this field, which remain at the core of interest. The point of this exploration is to recognize and understand the security issues identified with the distributed computing. A detailed literature review is done to study the approaches and concepts used in the field of cryptography in the cloud environment. In this work, the input is given by using the Benchmark dataset, and then the key is created by using the encryption algorithm Elliptic curve and Defi Hell Men and then concatenate the keys. Optimize the AES algorithm is hybrid with Blowfish to optimize the results after this decryption process is also performed to decode the data. At last, performance evaluation of the proposed system is done by using analysis of storage and time consumed during the encryption and decryption process. The results show the attack is reduced by ECDH approach with integrity MD5.